Security Controls
About
By the end of this module, you’ll be able to design appropriate security controls for any system by understanding their types, functions, and relationship to the CIA Triad.
Content
| Lesson | Est. Delivery Time | Skills |
|---|---|---|
| Intro to Security Controls & CIA Triad | 5 min | Introduction to the CIA Triad and Security Controls. |
| Case Study: The SolarWinds Supply Chain Attack | 10 min | Analyze a real-world security breach through the CIA Triad lens. |
| Control Category Breakdown | 10 min | Review the four main categories of security controls and how they relate to the SolarWinds attack. |
| Control Functions in Action | 5 min | Apply preventive, detective, and corrective controls. |
| Total content | 30 min |